Advanced SearchSearch Tips
Key Derivation Functions Using the Dual Key Agreement Based on QKD and RSA Cryptosystem
facebook(new window)  Pirnt(new window) E-mail(new window) Excel Download
 Title & Authors
Key Derivation Functions Using the Dual Key Agreement Based on QKD and RSA Cryptosystem
Park, Hojoong; Bae, Minyoung; Kang, Ju-Sung; Yeom, Yongjin;
  PDF(new window)
For a secure communication system, it is necessary to use secure cryptographic algorithms and keys. Modern cryptographic system generates high entropy encryption key through standard key derivation functions. Using recent progress in quantum key distribution(QKD) based on quantum physics, it is expected that we can enhance the security of modern cryptosystem. In this respect, the study on the dual key agreement is required, which combines quantum and modern cryptography. In this paper, we propose two key derivation functions using dual key agreement based on QKD and RSA cryptographic system. Furthermore, we demonstrate several simulations that estimate entropy of derived key so as to support the design rationale of our key derivation functions.
Key derivation function (KDF);Quantum key distribution (QKD);RSA;Dual key agreement;Entropy;
 Cited by
NIST SP 800-90B 프레딕터를 이용한 잡음원의 엔트로피 추정량에 대한 실험적 분석,박호중;배민영;염용진;강주성;

한국통신학회논문지, 2016. vol.41. 12, pp.1892-1902 crossref(new window)
NIST, Recommendation for Key Derivation Using Pseudorandom Functions, SP 800-108, Oct. 2009.

NIST, Recommendation for Password-Based Key Derivation, SP 800-132, Dec. 2010.

H. Krawczyk and P. Eronen, Hmac-based extract-and-expand key derivation function (hkdf), RFC 5869 (Proposed Standard), May 2010.

ID Quantique, KEY SERVER, Retrieved Mar., 26 from

ID Quantique, CERBERIS, from

R. Sarath and A. Shajin Narguman, "Key distribution using dual channel technique for ultimate security," Indian J. Sci. and Technol., vol. 8, no. 26, 2015.

A. Odeh, K. Elleithy, M. Alshowkan, and E. Abdelfattah, "Quantum key distribution by using public key algorithm(RSA)," IEEE INTECH 2013, pp. 83-86, London, UK, Aug. 2013.

ISO/IEC, Information technology-Security technique-Encryption algorithms-Part 2: Asymmetric ciphers, ISO/IEC 18033-2, May 2006.

NIST, Recommendation for Key Derivation through Extraction-then-expansion, SP 800-56C, Nov. 2011.

NIST, Recommendation for Pair-Wise key establishment schemes using integer factorization cryptography, SP 800-56B, Sept. 2014.

Y. S. Kim, "Group key transfer protocol based on shamir's secret sharing," J. KICS, vol. 39B no. 9, pp. 555-560, 2014. crossref(new window)

NIST, Recommendation for the entropy sources used for random bit generation, SP 800-90B, Aug. 2012.

T. Matthias and R. Renner, A randomness extractor for the Quantis device, vol. 31. Id Quantique Technical Report, 2012.

B. Barak, Y. Dodis, H. Krawczyk, O. Pereira, K. Pietrzak, F. Standaert, and Y. Yu, Leftover hash lemma, revisited, Sept. 2011.

G. V. Assche, Quantum cryptography and secret-key Distillation, CAMBRIDGE, 2012.

S. Im, H. Jeon, and J. Ha, "A novel distributed secret key extraction technique for wireless network," J. KICS, vol. 39A, no. 12, pp. 708-717, 2014. crossref(new window)

K. J. Ha, C. H. Seo, and D. Y. Kim, "Design of validation system for a crypto-algorithm implementation," J. KICS, vol. 39B no. 04, pp. 242-250, 2014. crossref(new window)

Whitewood, Whitewood Entropy Engine, Retrieved Jan., 23 from

NIST, Secure Hash Standard(SHS), FIPS 180-4, Aug. 2015.

TTA, Key Derivation Functions Using ARIA/SEED, TTAK.KO-12.0241, Jul. 2014.

NIST, Implementation Guidance for FIPS PUB 140-2 and the Cryptographic Module Validation Program, Jan. 2016.

H. Kang, Y. Yeom, and J. S. Kang, "An implementation of integrated tool for statistical randomness tests and entropy estimations," in Proc. KICS Winter Conf. 2016, Jeongseon, Korea, Jan. 2016.

G. Bertoni, J. Daemen, M. Peeters, and G. V. Assche, The KECCAK sponge function family, Retrieved Jan., 25 from